메뉴 건너뛰기




Volumn 4098 LNCS, Issue , 2006, Pages 108-122

Hierarchical combination of intruder theories

Author keywords

[No Author keywords available]

Indexed keywords

ALGEBRA; COMPUTABILITY AND DECIDABILITY; MATHEMATICAL OPERATORS; NETWORK PROTOCOLS; OPTIMIZATION;

EID: 33749446224     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11805618_9     Document Type: Conference Paper
Times cited : (13)

References (26)
  • 1
    • 0037209773 scopus 로고    scopus 로고
    • On the symbolic reduction of processes with cryptographic functions
    • R. Amadio, D. Lugiez, and V. Vanackère. On the symbolic reduction of processes with cryptographic functions. Theor. Comput. Sci., 290(1):695-740, 2003.
    • (2003) Theor. Comput. Sci. , vol.290 , Issue.1 , pp. 695-740
    • Amadio, R.1    Lugiez, D.2    Vanackère, V.3
  • 2
    • 0030078047 scopus 로고    scopus 로고
    • Unification in the union of disjoint equational theories, combining decision procedures
    • F. Baader and K. U. Schulz. Unification in the union of disjoint equational theories, combining decision procedures. J. Symb. Comput., 21(2):211-243, 1996.
    • (1996) J. Symb. Comput. , vol.21 , Issue.2 , pp. 211-243
    • Baader, F.1    Schulz, K.U.2
  • 3
    • 0142188052 scopus 로고    scopus 로고
    • An on-the-fly model-checker for security protocol analysis
    • Einar Snekkenes and Dieter Gollmann, editors LNCS 2808, Springer-Verlag
    • D. Basin, S. Mödersheim, and L. Viganò. An On-The-Fly Model-Checker for Security Protocol Analysis. In Einar Snekkenes and Dieter Gollmann, editors, Proceedings of ESORICS'03, LNCS 2808, pages 253-270. Springer-Verlag, 2003.
    • (2003) Proceedings of ESORICS'03 , pp. 253-270
    • Basin, D.1    Mödersheim, S.2    Viganò, L.3
  • 4
    • 84879529172 scopus 로고    scopus 로고
    • Symbolic trace analysis of cryptographic protocols
    • LNCS 2076, Springer-Verlag, Berlin
    • M. Boreale. Symbolic trace analysis of cryptographic protocols. In Proceedings of the 28th ICALP'01, LNCS 2076, pages 667-681. Springer-Verlag, Berlin, 2001.
    • (2001) Proceedings of the 28th ICALP'01 , pp. 667-681
    • Boreale, M.1
  • 5
    • 0034777649 scopus 로고    scopus 로고
    • Intercepting mobile communications: The insecurity of 802.11
    • N. Borisov, I. Goldberg, and D. Wagner. Intercepting mobile communications: the insecurity of 802.11. In Proceedings of MOBICOM 2001, pages 180-189, 2001.
    • (2001) Proceedings of MOBICOM 2001 , pp. 180-189
    • Borisov, N.1    Goldberg, I.2    Wagner, D.3
  • 8
    • 26444458330 scopus 로고    scopus 로고
    • Combining intruder theories
    • Luís Caires, Giuseppe F. Italiano, Luís Monteiro, Catuscia Palamidessi, and Moti Yung, editors, ICALP, Springer
    • Y. Chevalier and M. Rusinowitch. Combining intruder theories. In Luís Caires, Giuseppe F. Italiano, Luís Monteiro, Catuscia Palamidessi, and Moti Yung, editors, ICALP, volume 3580 of Lecture Notes in Computer Science, pages 639-651. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3580 , pp. 639-651
    • Chevalier, Y.1    Rusinowitch, M.2
  • 10
    • 35048861399 scopus 로고    scopus 로고
    • Intruder theories (ongoing work)
    • Igor Walukiewicz, editor, 7th International Conference, FOSSACS 2004, Barcelona, Spain, March. Springer Verlag
    • H. Comon-Lundh. Intruder theories (ongoing work). In Igor Walukiewicz, editor, 7th International Conference, FOSSACS 2004, volume 2987 of Lecture Notes on Computer Science, pages 1-4, Barcelona, Spain, March 2004. Springer Verlag.
    • (2004) Lecture Notes on Computer Science , vol.2987 , pp. 1-4
    • Comon-Lundh, H.1
  • 12
    • 35248836596 scopus 로고    scopus 로고
    • Easy intruder deductions
    • Verification: Theory and Practice
    • H. Comon-Lundh and R. Treinen. Easy intruder deductions. In Verification: Theory and Practice, volume 2772 of Lecture Notes in Computer Science, pages 225-242, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2772 , pp. 225-242
    • Comon-Lundh, H.1    Treinen, R.2
  • 15
    • 0003250993 scopus 로고
    • New results on local inference relations
    • R. Givan and D. A. McAllester. New results on local inference relations. In KR, pages 403-412, 1992.
    • (1992) KR , pp. 403-412
    • Givan, R.1    McAllester, D.A.2
  • 16
    • 85034749972 scopus 로고
    • On word problems in equational theories
    • ICALP, Springer
    • J. Hsiang and M. Rusinowitch. On word problems in equational theories. In ICALP, volume 267 of LNCS, pages 54-71. Springer, 1987.
    • (1987) LNCS , vol.267 , pp. 54-71
    • Hsiang, J.1    Rusinowitch, M.2
  • 17
    • 51149098006 scopus 로고    scopus 로고
    • An e-unification algorithm for analyzing protocols that use modular exponentiation
    • Robert Nieuwenhuis, editor, RTA. Springer
    • D. Kapur, P. Narendran, and L. Wang. An e-unification algorithm for analyzing protocols that use modular exponentiation. In Robert Nieuwenhuis, editor, RTA, volume 2706 of Lecture Notes in Computer Science, pages 165-179. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2706 , pp. 165-179
    • Kapur, D.1    Narendran, P.2    Wang, L.3
  • 19
    • 0027578148 scopus 로고
    • Automatic recognition of tractability in inference relations
    • David A. McAllester. Automatic recognition of tractability in inference relations. J. ACM, 40(2):284-303, 1993.
    • (1993) J. ACM , vol.40 , Issue.2 , pp. 284-303
    • McAllester, D.A.1
  • 20
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • C. Meadows. The NRL protocol analyzer: an overview. Journal of Logic Programming, 26(2):113-131, 1996.
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 23
    • 24144477933 scopus 로고    scopus 로고
    • Symbolic protocol analysis with an abelian group operator or Diffie-Hellman exponentiation
    • J. Millen and V. Shmatikov. Symbolic protocol analysis with an abelian group operator or Diffie-Hellman exponentiation. Journal of Computer Security, 2005.
    • (2005) Journal of Computer Security
    • Millen, J.1    Shmatikov, V.2
  • 25
    • 35048827395 scopus 로고    scopus 로고
    • Decidable analysis of cryptographic protocols with products and modular exponentiation. in Proceedings of ESOP'04
    • Springer-Verlag
    • V. Shmatikov. Decidable analysis of cryptographic protocols with products and modular exponentiation. In Proceedings of ESOP'04, volume 2986 of Lecture Notes in Computer Science, pages 355-369. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2986 , pp. 355-369
    • Shmatikov, V.1
  • 26
    • 0009582826 scopus 로고    scopus 로고
    • The srp authentication and key exchange system
    • IETF - Network Working Group, September
    • T. Wu. The srp authentication and key exchange system. Technical Report RFC 2945, IETF - Network Working Group, September 2000. available at http://www.ietf.org/rfc/rfc2945.txt.
    • (2000) Technical Report , vol.RFC 2945
    • Wu, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.